Return-Path: <sentto-279987-3967-1006979431-fc=all.net@returns.groups.yahoo.com> Delivered-To: fc@all.net Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Wed, 28 Nov 2001 12:57:08 -0800 (PST) Received: (qmail 1001 invoked by uid 510); 28 Nov 2001 20:44:19 -0000 Received: from n2.groups.yahoo.com (216.115.96.52) by all.net with SMTP; 28 Nov 2001 20:44:19 -0000 X-eGroups-Return: sentto-279987-3967-1006979431-fc=all.net@returns.groups.yahoo.com Received: from [10.1.1.222] by n2.groups.yahoo.com with NNFMP; 28 Nov 2001 20:30:31 -0000 X-Sender: fc@red.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-8_0_0_1); 28 Nov 2001 20:30:31 -0000 Received: (qmail 49740 invoked from network); 28 Nov 2001 20:30:29 -0000 Received: from unknown (216.115.97.171) by m4.grp.snv.yahoo.com with QMQP; 28 Nov 2001 20:30:29 -0000 Received: from unknown (HELO red.all.net) (65.0.156.78) by mta3.grp.snv.yahoo.com with SMTP; 28 Nov 2001 20:30:28 -0000 Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id fASKWIh13708 for iwar@onelist.com; Wed, 28 Nov 2001 12:32:18 -0800 Message-Id: <200111282032.fASKWIh13708@red.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL3] From: Fred Cohen <fc@all.net> X-Yahoo-Profile: fcallnet Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Wed, 28 Nov 2001 12:32:18 -0800 (PST) Reply-To: iwar@yahoogroups.com Subject: [iwar] [fc:Computer.Security.Enhancement.Act.of.2001.(Engrossed.in.House.)] Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Computer Security Enhancement Act of 2001 (Engrossed in House ) 107th CONGRESS 1st Session H. R. 1259 AN ACT To amend the National Institute of Standards and Technology Act to enhance the ability of the National Institute of Standards and Technology to improve computer security, and for other purposes. HR 1259 EH 107th CONGRESS 1st Session H. R. 1259 AN ACT To amend the National Institute of Standards and Technology Act to enhance the ability of the National Institute of Standards and Technology to improve computer security, and for other purposes. Be it enacted by the Senate and House of Representatives of the United States of America in Congress assembled, SECTION 1. SHORT TITLE. This Act may be cited as the `Computer Security Enhancement Act of 2001'. SEC. 2. FINDINGS AND PURPOSES. (a) FINDINGS- The Congress finds the following: (1) The National Institute of Standards and Technology has responsibility for developing standards and guidelines needed to ensure the cost-effective security and privacy of sensitive information in Federal computer systems. (2) The Federal Government has an important role in ensuring the protection of sensitive, but unclassified, information controlled by Federal agencies. (3) Technology that is based on the application of cryptography exists and can be readily provided by private sector companies to ensure the confidentiality, authenticity, and integrity of information associated with public and private activities. (4) The development and use of encryption technologies by industry should be driven by market forces rather than by Government imposed requirements. (b) PURPOSES- The purposes of this Act are to-- (1) reinforce the role of the National Institute of Standards and Technology in ensuring the security of unclassified information in Federal computer systems; and (2) promote technology solutions based on private sector offerings to protect the security of Federal computer systems. SEC. 3. SECURITY OF FEDERAL COMPUTERS AND NETWORKS. Section 20(b) of the National Institute of Standards and Technology Act (15 U.S.C. 278g-3(b)) is amended-- (1) by redesignating paragraphs (4) and (5) as paragraphs (7) and (8), respectively; and (2) by inserting after paragraph (3) the following new paragraphs: `(4) except for national security systems, as defined in section 5142 of Public Law 104-106 (40 U.S.C. 1452), to provide guidance and assistance to Federal agencies for protecting the security and privacy of sensitive information in interconnected Federal computer systems, including identification of significant risks thereto; `(5) to promote compliance by Federal agencies with existing Federal computer information security and privacy guidelines; `(6) in consultation with appropriate Federal agencies, assist Federal response efforts related to unauthorized access to Federal computer systems;'. SEC. 4. COMPUTER SECURITY IMPLEMENTATION. Section 20 of the National Institute of Standards and Technology Act (15 U.S.C. 278g-3) is further amended-- (1) by redesignating subsections (c) and (d) as subsections (e) and (f), respectively; and (2) by inserting after subsection (b) the following new subsection: `(c)(1) In carrying out subsection (a)(2) and (3), the Institute shall-- `(A) emphasize the development of technology-neutral policy guidelines for computer security and electronic authentication practices by the Federal agencies; `(B) promote the use of commercially available products, which appear on the list required by paragraph (2), to provide for the security and privacy of sensitive information in Federal computer systems; `(C) develop qualitative and quantitative measures appropriate for assessing the quality and effectiveness of information security and privacy programs at Federal agencies; `(D) upon the request of a Federal agency, perform evaluations to assess its existing information security and privacy programs; `(E) promote development of accreditation procedures for Federal agencies based on the measures developed under subparagraph (C); `(F) if requested, consult with and provide assistance to Federal agencies regarding the selection by agencies of security technologies and products and the implementation of security practices; and `(G)(i) develop uniform testing procedures suitable for determining the conformance of commercially available security products to the guidelines and standards developed under subsection (a)(2) and (3); `(ii) establish procedures for certification of private sector laboratories to perform the tests and evaluations of commercially available security products developed in accordance with clause (i); and `(iii) promote the testing of commercially available security products for their conformance with guidelines and standards developed under subsection (a)(2) and (3). `(2) The Institute shall maintain and make available to Federal agencies and to the public a list of commercially available security products that have been tested by private sector laboratories certified in accordance with procedures established under paragraph (1)(G)(ii), and that have been found to be in conformance with the guidelines and standards developed under subsection (a)(2) and (3). `(3) The Institute shall annually transmit to the Congress, in an unclassified format, a report containing-- `(A) the findings of the evaluations and tests of Federal computer systems conducted under this section during the 12 months preceding the date of the report, including the frequency of the use of commercially available security products included on the list required by paragraph (2); `(B) the planned evaluations and tests under this section for the 12 months following the date of the report; and `(C) any recommendations by the Institute to Federal agencies resulting from the findings described in subparagraph (A), and the response by the agencies to those recommendations.'. SEC. 5. COMPUTER SECURITY REVIEW, PUBLIC MEETINGS, AND INFORMATION. Section 20 of the National Institute of Standards and Technology Act (15 U.S.C. 278g-3), as amended by this Act, is further amended by inserting after subsection (c), as added by section 4 of this Act, the following new subsection: `(d)(1) The Institute shall solicit the recommendations of the Computer System Security and Privacy Advisory Board, established by section 21, regarding standards and guidelines that are being considered for submittal to the Secretary in accordance with subsection (a)(4). The recommendations of the Board shall accompany standards and guidelines submitted to the Secretary. `(2) There are authorized to be appropriated to the Secretary $1,030,000 for fiscal year 2002 and $1,060,000 for fiscal year 2003 to enable the Computer System Security and Privacy Advisory Board, established by section 21, to identify emerging issues related to computer security, privacy, and cryptography and to convene public meetings on those subjects, receive presentations, and publish reports, digests, and summaries for public distribution on those subjects.'. SEC. 6. LIMITATION ON PARTICIPATION IN REQUIRING ENCRYPTION AND ELECTRONIC AUTHENTICATION STANDARDS. Section 20 of the National Institute of Standards and Technology Act (15 U.S.C. 278g-3), as amended by this Act, is further amended by adding at the end the following new subsection: `(g) The Institute shall not promulgate, enforce, or otherwise adopt standards or policies for the Federal establishment of encryption and electronic authentication standards required for use in computer systems other than Federal Government computer systems.'. SEC. 7. MISCELLANEOUS AMENDMENTS. Section 20 of the National Institute of Standards and Technology Act (15 U.S.C. 278g-3), as amended by this Act, is further amended-- (1) in subsection (b)(8), as so redesignated by section 3(1) of this Act, by inserting `to the extent that such coordination will improve computer security and to the extent necessary for improving such security for Federal computer systems' after `Management and Budget)'; (2) in subsection (e), as so redesignated by section 4(1) of this Act, by striking `shall draw upon' and inserting in lieu thereof `may draw upon'; (3) in subsection (e)(2), as so redesignated by section 4(1) of this Act, by striking `(b)(5)' and inserting in lieu thereof `(b)(7)'; and (4) in subsection (f)(1)(B)(i), as so redesignated by section 4(1) of this Act, by inserting `and computer networks' after `computers'. SEC. 8. FEDERAL COMPUTER SYSTEM SECURITY TRAINING. Section 5(b) of the Computer Security Act of 1987 (40 U.S.C. 759 note) is amended-- (1) by striking `and' at the end of paragraph (1); (2) by striking the period at the end of paragraph (2) and inserting in lieu thereof `; and'; and (3) by adding at the end the following new paragraph: `(3) to include emphasis on protecting information in Federal databases and Federal computer sites that are accessible through public networks.'. SEC. 9. COMPUTER SECURITY FELLOWSHIP PROGRAM. There are authorized to be appropriated to the Secretary of Commerce $5,000,000 for fiscal year 2002 and $5,000,000 for fiscal year 2003 for the Director of the National Institute of Standards and Technology for fellowships, subject to the provisions of section 18 of the National Institute of Standards and Technology Act (15 U.S.C. 278g-1), to support students at institutions of higher learning in computer security. Amounts authorized by this section shall not be subject to the percentage limitation stated in such section 18. SEC. 10. STUDY OF ELECTRONIC AUTHENTICATION TECHNOLOGIES BY THE NATIONAL RESEARCH COUNCIL. (a) REVIEW BY NATIONAL RESEARCH COUNCIL- Not later than 90 days after the date of the enactment of this Act, the Secretary of Commerce shall enter into a contract with the National Research Council of the National Academy of Sciences to conduct a study of electronic authentication technologies for use by individuals, businesses, and government. (b) CONTENTS- The study referred to in subsection (a) shall-- (1) assess technology needed to support electronic authentication technologies; (2) assess current public and private plans for the deployment of electronic authentication technologies; (3) assess interoperability, scalability, and integrity of private and public entities that are elements of electronic authentication technologies; and (4) address such other matters as the National Research Council considers relevant to the issues of electronic authentication technologies. (c) INTERAGENCY COOPERATION WITH STUDY- All agencies of the Federal Government shall cooperate fully with the National Research Council in its activities in carrying out the study under this section, including access by properly cleared individuals to classified information if necessary. (d) REPORT- Not later than 18 months after the date of the enactment of this Act, the Secretary of Commerce shall transmit to the Committee on Science of the House of Representatives and the Committee on Commerce, Science, and Transportation of the Senate a report setting forth the findings, conclusions, and recommendations of the National Research Council for public policy related to electronic authentication technologies for use by individuals, businesses, and government. The National Research Council shall not recommend the implementation or application of a specific electronic authentication technology or electronic authentication technical specification for use by the Federal Government. Such report shall be submitted in unclassified form. (e) AUTHORIZATION OF APPROPRIATIONS- There are authorized to be appropriated to the Secretary of Commerce $450,000 for fiscal year 2002, to remain available until expended, for carrying out this section. SEC. 11. PROMOTION OF NATIONAL INFORMATION SECURITY. The Under Secretary of Commerce for Technology shall-- (1) promote an increased use of security techniques, such as risk assessment, and security tools, such as cryptography, to enhance the protection of the Nation's information infrastructure; (2) establish a central repository of information for dissemination to the public to promote awareness of information security vulnerabilities and risks; and (3) in a manner consistent with section 12(d) of the National Technology Transfer and Advancement Act of 1995 (15 U.S.C. 272 nt), promote the development of national standards-based infrastructures needed to support government, commercial, and private uses of encryption technologies for confidentiality and authentication. SEC. 12. ELECTRONIC AUTHENTICATION INFRASTRUCTURES. (a) ELECTRONIC AUTHENTICATION INFRASTRUCTURES- (1) TECHNOLOGY-NEUTRAL GUIDELINES AND STANDARDS- Not later than 18 months after the date of the enactment of this Act, the Director, in consultation with industry and appropriate Federal agencies, shall develop technology-neutral guidelines and standards, or adopt existing technology-neutral industry guidelines and standards, for electronic authentication infrastructures to be made available to Federal agencies so that such agencies may effectively select and utilize electronic authentication technologies in a manner that is-- (A) adequately secure to meet the needs of those agencies and their transaction partners; and (B) interoperable, to the maximum extent possible. (2) ELEMENTS- The guidelines and standards developed under paragraph (1) shall include-- (A) protection profiles for cryptographic and noncryptographic methods of authenticating identity for electronic authentication products and services; (B) a core set of interoperability specifications for the use of electronic authentication products and services in electronic transactions between Federal agencies and their transaction partners; and (C) validation criteria to enable Federal agencies to select cryptographic electronic authentication products and services appropriate to their needs. (3) REVISIONS- The Director shall periodically review the guidelines and standards developed under paragraph (1) and revise them as appropriate. (b) LISTING OF PRODUCTS- Not later than 30 months after the date of the enactment of this Act, and thereafter, the Director shall maintain and make available to Federal agencies a nonmandatory list of commercially available electronic authentication products, and other such products used by Federal agencies, evaluated as conforming with the guidelines and standards developed under subsection (a). (c) SPECIFICATIONS FOR ELECTRONIC CERTIFICATION AND MANAGEMENT TECHNOLOGIES- (1) SPECIFICATIONS- The Director shall, as appropriate, establish core specifications for particular electronic certification and management technologies, or their components, for use by Federal agencies. (2) EVALUATION- The Director shall advise Federal agencies on how to evaluate the conformance with the specifications established under paragraph (1) of electronic certification and management technologies, developed for use by Federal agencies or available for such use. (3) MAINTENANCE OF LIST- The Director shall maintain and make available to Federal agencies a list of electronic certification and management technologies evaluated as conforming to the specifications established under paragraph (1). (d) REPORTS- Not later than 18 months after the date of the enactment of this Act, and annually thereafter, the Director shall transmit to the Congress a report that includes-- (1) a description and analysis of the utilization by Federal agencies of electronic authentication technologies; and (2) a description and analysis regarding the problems Federal agencies are having, and the progress such agencies are making, in implementing electronic authentication infrastructures. (e) DEFINITIONS- For purposes of this section-- (1) the term `electronic authentication' means cryptographic or noncryptographic methods of authenticating identity in an electronic communication; (2) the term `electronic authentication infrastructure' means the software, hardware, and personnel resources, and the procedures, required to effectively utilize electronic authentication technologies; (3) the term `electronic certification and management technologies' means computer systems, including associated personnel and procedures, that enable individuals to apply electronic authentication to electronic information; and (4) the term `protection profile' means a list of security functions and associated assurance levels used to describe a product. SEC. 13. SOURCE OF AUTHORIZATIONS. There are authorized to be appropriated to the Secretary of Commerce $7,000,000 for fiscal year 2002 and $8,000,000 for fiscal year 2003, for the National Institute of Standards and Technology to carry out activities authorized by this Act for which funds are not otherwise specifically authorized to be appropriated by this Act. Passed the House of Representatives November 27, 2001. Attest: Clerk. ------------------------ Yahoo! Groups Sponsor ---------------------~--> Need new boots for winter? Looking for a perfect gift for your shoe loving friends? Zappos.com is the perfect fit for all your shoe needs! http://us.click.yahoo.com/iWGL5B/QrSDAA/ySSFAA/kgFolB/TM ---------------------------------------------------------------------~-> ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2001-12-31 20:59:59 PST